Analysis

  • max time kernel
    148s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    12-07-2022 08:54

General

  • Target

    STD 35 GA Plan_doc.exe

  • Size

    867KB

  • MD5

    d367a1f17ef481d21775f424c4beb7b7

  • SHA1

    fc083e789e7f06627bf3465f74524a5758896f32

  • SHA256

    5846e4c3d380772683c6398d37c33d7a3484762fccd6d8636b2b5d337637d00a

  • SHA512

    2b9c821c00989e6cf9ee1279f8d34d8d02f3af5e07269d34e8e29c6a137e66522eff8211fb3c68bfafaef099aaec926a0a070bc940dd94f30657061b98541566

Malware Config

Extracted

Family

xloader

Version

2.9

Campaign

iewb

Decoy

n8FLlgIlb1rSEg5hJ9xMbw4hcmR38Q==

5vIAIY+pt81OtWs+FdIEdk7Y

LHIKc+oWGIQUUlfAAtEEdk7Y

ePM/cX2jvHrS

5hvPEw22+fdvmJz3C8FIVq0=

mb9EeX2jvHrS

Dx2zIYNvfjo8VUo5

6jVPnyJekv2RAc4gLKNwEqQ=

KWatHyjdE5Gj1Ng=

t9lk70gzUAZty4qjbVjF

6eUBeFPzKBWT125BFNIEdk7Y

dZUXOIyqTJGj1Ng=

iL3TVh2Jl5QVStnzxcAhIL8=

J1prtyklUfZGR/xDD71IbkWRd2yx

s9FgCOBRW9bU0Y6jbVjF

RYCbQDzcFBhcylgu

Fl0BV/8RJm6F9QRg8LXXTLo=

0dhumHzrCCZ3wdQg7nFF1AlL6Tk=

xvL+iL6wwX+/wH9K4lbZ/A==

N0lVceIFD5Gj1Ng=

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • suricata: ET MALWARE FormBook CnC Checkin (GET)

    suricata: ET MALWARE FormBook CnC Checkin (GET)

  • Xloader payload 4 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Suspicious use of SetThreadContext 3 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 34 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2240
    • C:\Users\Admin\AppData\Local\Temp\STD 35 GA Plan_doc.exe
      "C:\Users\Admin\AppData\Local\Temp\STD 35 GA Plan_doc.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3872
      • C:\Users\Admin\AppData\Local\Temp\STD 35 GA Plan_doc.exe
        "C:\Users\Admin\AppData\Local\Temp\STD 35 GA Plan_doc.exe"
        3⤵
          PID:4632
        • C:\Users\Admin\AppData\Local\Temp\STD 35 GA Plan_doc.exe
          "C:\Users\Admin\AppData\Local\Temp\STD 35 GA Plan_doc.exe"
          3⤵
          • Checks computer location settings
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:5004
        • C:\Users\Admin\AppData\Local\Temp\STD 35 GA Plan_doc.exe
          "C:\Users\Admin\AppData\Local\Temp\STD 35 GA Plan_doc.exe"
          3⤵
            PID:4664
          • C:\Users\Admin\AppData\Local\Temp\STD 35 GA Plan_doc.exe
            "C:\Users\Admin\AppData\Local\Temp\STD 35 GA Plan_doc.exe"
            3⤵
              PID:3564
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3872 -s 1488
              3⤵
              • Program crash
              PID:3204
          • C:\Windows\SysWOW64\colorcpl.exe
            "C:\Windows\SysWOW64\colorcpl.exe"
            2⤵
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2752
            • C:\Windows\SysWOW64\cmd.exe
              /c del "C:\Users\Admin\AppData\Local\Temp\STD 35 GA Plan_doc.exe"
              3⤵
                PID:4156
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3872 -ip 3872
            1⤵
              PID:5080

            Network

            MITRE ATT&CK Matrix ATT&CK v6

            Discovery

            Query Registry

            1
            T1012

            System Information Discovery

            1
            T1082

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • memory/2240-153-0x00000000087F0000-0x00000000088A4000-memory.dmp
              Filesize

              720KB

            • memory/2240-145-0x00000000081E0000-0x0000000008345000-memory.dmp
              Filesize

              1.4MB

            • memory/2240-154-0x00000000087F0000-0x00000000088A4000-memory.dmp
              Filesize

              720KB

            • memory/2752-147-0x0000000000AD0000-0x0000000000AE9000-memory.dmp
              Filesize

              100KB

            • memory/2752-146-0x0000000000000000-mapping.dmp
            • memory/2752-150-0x0000000002FB0000-0x00000000032FA000-memory.dmp
              Filesize

              3.3MB

            • memory/2752-151-0x0000000000DA0000-0x0000000000DCC000-memory.dmp
              Filesize

              176KB

            • memory/2752-152-0x0000000002E30000-0x0000000002EC0000-memory.dmp
              Filesize

              576KB

            • memory/2752-148-0x0000000000DA0000-0x0000000000DCC000-memory.dmp
              Filesize

              176KB

            • memory/3564-137-0x0000000000000000-mapping.dmp
            • memory/3872-130-0x0000000000AD0000-0x0000000000BAE000-memory.dmp
              Filesize

              888KB

            • memory/3872-135-0x000000000B6D0000-0x000000000B736000-memory.dmp
              Filesize

              408KB

            • memory/3872-134-0x000000000B630000-0x000000000B6CC000-memory.dmp
              Filesize

              624KB

            • memory/3872-133-0x0000000005430000-0x000000000543A000-memory.dmp
              Filesize

              40KB

            • memory/3872-132-0x0000000005460000-0x00000000054F2000-memory.dmp
              Filesize

              584KB

            • memory/3872-131-0x0000000005A10000-0x0000000005FB4000-memory.dmp
              Filesize

              5.6MB

            • memory/4156-149-0x0000000000000000-mapping.dmp
            • memory/4632-136-0x0000000000000000-mapping.dmp
            • memory/4664-138-0x0000000000000000-mapping.dmp
            • memory/5004-144-0x0000000000F10000-0x0000000000F21000-memory.dmp
              Filesize

              68KB

            • memory/5004-143-0x0000000001010000-0x000000000135A000-memory.dmp
              Filesize

              3.3MB

            • memory/5004-142-0x0000000000400000-0x000000000042C000-memory.dmp
              Filesize

              176KB

            • memory/5004-140-0x0000000000400000-0x000000000042C000-memory.dmp
              Filesize

              176KB

            • memory/5004-139-0x0000000000000000-mapping.dmp